diff options
author | Ulf Möller <ulf@openssl.org> | 1999-12-03 23:56:08 +0000 |
---|---|---|
committer | Ulf Möller <ulf@openssl.org> | 1999-12-03 23:56:08 +0000 |
commit | cd9860af26bf1acb404dc1ab7a2738e817ebcd1f (patch) | |
tree | 54cfed89ec12259a8cb7bd16d34d4d17e492de32 /rsaref/rsaref.c | |
parent | 23fb9bc0eb455d1a0a561a7fdcddf9bfacd96f1a (diff) | |
download | openssl-new-cd9860af26bf1acb404dc1ab7a2738e817ebcd1f.tar.gz |
Circumvent an exploitable buffer overrun error in RSA Security's RSAREF
library. See: http://www.CORE-SDI.COM/english/ssh/index.html
Submitted by:
Reviewed by:
PR:
Diffstat (limited to 'rsaref/rsaref.c')
-rw-r--r-- | rsaref/rsaref.c | 21 |
1 files changed, 21 insertions, 0 deletions
diff --git a/rsaref/rsaref.c b/rsaref/rsaref.c index 7677eb9fce..1a4c0f378b 100644 --- a/rsaref/rsaref.c +++ b/rsaref/rsaref.c @@ -209,6 +209,11 @@ int RSA_ref_private_decrypt(int len, unsigned char *from, unsigned char *to, if (!RSAref_Private_eay2ref(rsa,&RSAkey)) goto err; + if (len > RSAref_MAX_LEN) + { + RSAREFerr(RSAREF_F_RSA_REF_PRIVATE_DECRYPT,RSAREF_R_LEN); + goto err; + } if ((i=RSAPrivateDecrypt(to,&outlen,from,len,&RSAkey)) != 0) { RSAREFerr(RSAREF_F_RSA_REF_PRIVATE_DECRYPT,i); @@ -232,6 +237,11 @@ int RSA_ref_private_encrypt(int len, unsigned char *from, unsigned char *to, } if (!RSAref_Private_eay2ref(rsa,&RSAkey)) goto err; + if (len + 3 > RSAref_MAX_LEN) + { + RSAREFerr(RSAREF_F_RSA_REF_PRIVATE_ENCRYPT,RSAREF_R_LEN); + goto err; + } if ((i=RSAPrivateEncrypt(to,&outlen,from,len,&RSAkey)) != 0) { RSAREFerr(RSAREF_F_RSA_REF_PRIVATE_ENCRYPT,i); @@ -250,6 +260,12 @@ int RSA_ref_public_decrypt(int len, unsigned char *from, unsigned char *to, if (!RSAref_Public_eay2ref(rsa,&RSAkey)) goto err; + if (len > RSAref_MAX_LEN) + { + RSAREFerr(RSAREF_F_RSA_REF_PUBLIC_DECRYPT,RSAREF_R_LEN); + goto err; + } + goto err; if ((i=RSAPublicDecrypt(to,&outlen,from,len,&RSAkey)) != 0) { RSAREFerr(RSAREF_F_RSA_REF_PUBLIC_DECRYPT,i); @@ -286,6 +302,11 @@ int RSA_ref_public_encrypt(int len, unsigned char *from, unsigned char *to, if (!RSAref_Public_eay2ref(rsa,&RSAkey)) goto err; + if (len + 3 > RSAref_MAX_LEN) + { + RSAREFerr(RSAREF_F_RSA_REF_PUBLIC_ENCRYPT,RSAREF_R_LEN); + goto err; + } if ((i=RSAPublicEncrypt(to,&outlen,from,len,&RSAkey,&rnd)) != 0) { RSAREFerr(RSAREF_F_RSA_REF_PUBLIC_ENCRYPT,i); |